About your Search

20121101
20121130
Search Results 0 to 3 of about 4
and there. petty thefts but it was adding up and it's a federal crime. so the fbi staked out these trucks and filmed them stealing. we pulled the trucks back to the loading dock in oklahoma. these are trucks from koch industry, trucks that had an agreement that they were just cheating. it wasn't just driver stealing off the top and selling them to broke broque ers. not exact but because on the loading dock a big tall white guy was standing there saying i want more, more overage. now overage, term used for the skim and the guy standing there calling for more ore bridge was charles should -- charles koch i have one question as an investigator. the guy was already worth billions at that time. today he's worth over $20 billion. he got it from his daddy who had built oil refineries for joe stalin and made a billion and came back to the u.s. and founded the john birch society so the koch brothers got their money field fascist way. silvie already had his billions, so why? why does he need a couple of bucks from a poor indian family in the middle of oklahoma? and i know the answer because the s
on the specifics of the investigation. the fbi has its own protocols in terms of how they proceed. and i'm going to let director mueller and others examine those protocols, and make some statements to the public generally. i do want to emphasize what i said before. general petraeus had an extraordinary career. deserved this country with great distinction in iraq, in afghanistan, and as head of the cia. by his own assessment, he did not meet the standards that he felt were necessary as the director of cia with respect to this personal matter that he is now dealing with, with his family, and with his wife. and it's on that basis that he tendered his resignation, and it's on that basis that i accepted it. but i want to emphasize that from my perspective at least, he has provided this country and extraordinary service. we are safer because of the work that dave petraeus has done, and my main hope right now is that he and his family are able to move on, and that this instead of being -- this into a being a single side note on what has been otherwise been an extraordinary career. [inaudible] >> you kn
. the trustees began by asking former fbi director free to lead an independent investigation which yielded 119 recommendations on how to enhance our internal policies and practices. we've already implemented more than one-third of the recommendations, and many more are nearing completion. we remain p committed to the process because we believe it made us a better, stronger university. we're committed to the fight against child abuse. central to this effort is the newly established center for the protection of children based at the penn state hershey hospital and ongoing partnership with the pennsylvania coalition against rape. earlier this week, we completed the first penn state national conference on child sexual abuse. this forum, brought together leaders, experts from law enforcement, pediatric medicine, prevention research, and education. we formed the penn state network for child protection a and well being comprised of 35 faculty members with interdisciplinary expertise with the aim to accelerate the pace of discovery by linking research and practice and build the network with additional
more problematic. i think one of the other panelists mentioned this quote from fbi director, and you see the same concerns of talking about in the commercial sphere, to. he said basically set to every company is being hacked one way or another and it's not a question of when they will be hacked. it will be a question of when it will happen again. that might be a pessimistic view of how bitter cybersecurity sector can be. it is certainly a theme you see in the space. my only point, the only other point i want to make on commercial data is that you see and report. there was a report issued by verizon about data breach investigation, that suggests that a lease in endears large numbers of serious cyber intrusions intrusions have been aimed at create taking authentication credential, passwords, usernames, things like that. things that can be used for later inclusion's in the future, things that might give an intruder broader access to a network. so i'd like to shift for a moment, those ideas in mind, and talk about offense of cyber operations. and what do we mean by that and what is, what
Search Results 0 to 3 of about 4